General

  • Target

    3f9c4bae8effa8ca29e831d2eff2d70de4663373871d41148fe0a523e8671136

  • Size

    140KB

  • MD5

    2aacff88af2be6a7ccebc5502d9c5143

  • SHA1

    cf1be0cc571c449310633a399563b0c9562e73bd

  • SHA256

    3f9c4bae8effa8ca29e831d2eff2d70de4663373871d41148fe0a523e8671136

  • SHA512

    8a0a4cfde0a2489ac4c77c0311b4d27279c1d9cad7f6a171eaef8c54f4b5dc5ff52c0a38cf89482621258ac371328fda8bae2373c4e2404bf07a4ecea53dffce

  • SSDEEP

    3072:sebzXIsLKVR8PpBc4oYPFPx5AB/oj0dB8IH1D9oMu22oZzzZP:sebzXIXR+3d5j0dB/1D9oMu22oZzzZP

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3f9c4bae8effa8ca29e831d2eff2d70de4663373871d41148fe0a523e8671136
    .elf linux x86